To see the other types of publications on this topic, follow the link: Wireless LAN Security.

Journal articles on the topic 'Wireless LAN Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless LAN Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Andress, Mandy. "Wireless LAN Security." Information Systems Security 11, no. 3 (July 2002): 29–33. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37897.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gholap, Prof Yuvraj N. "Study of Wireless LAN Security 802.11b." Indian Journal of Applied Research 4, no. 2 (October 1, 2011): 11–13. http://dx.doi.org/10.15373/2249555x/feb2014/73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Held, Gilbert. "Overcoming Wireless LAN Security Vulnerabilities." Information Systems Security 11, no. 3 (July 2002): 22–27. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37896.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paulson, L. D. "Vendors push wireless LAN security." Computer 36, no. 1 (January 2003): 28. http://dx.doi.org/10.1109/mc.2003.1160051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (II). Security Assurance." International Journal of Information Security and Cybercrime 3, no. 1 (June 28, 2014): 37–46. http://dx.doi.org/10.19107/ijisc.2014.01.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Furnell, Steven, and Bogdan Ghita. "Usability pitfalls in Wireless LAN security." Network Security 2006, no. 3 (March 2006): 4–8. http://dx.doi.org/10.1016/s1353-4858(06)70343-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Branch, J. W., N. L. Petroni, L. Van Doorn, and D. Safford. "Autonomic 802.11 wireless LAN security auditing." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 56–65. http://dx.doi.org/10.1109/msp.2004.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, J. "Providing for wireless LAN security. 2." IT Professional 4, no. 6 (November 2002): 44–48. http://dx.doi.org/10.1109/mitp.2002.1114847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jyh-Cheng Chen, Ming-Chia Jiang, and Yi-Wen Liu. "Wireless LAN security and IEEE 802.11i." IEEE Wireless Communications 12, no. 1 (February 2005): 27–36. http://dx.doi.org/10.1109/mwc.2005.1404570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
11

Zeng, Li Li. "Wireless LAN Security Vulnerabilities and Improvement Measures." Applied Mechanics and Materials 543-547 (March 2014): 3335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3335.

Full text
Abstract:
This paper mainly analyzed the security of TKIP protocol and VPN technology ,the wireless LAN 802.11 and 802.1x/EXP security vulnerabilities: defects of SSID and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WEP Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The author put forward improvement authentication and encryption method as improving wireless LAN security measures.
APA, Harvard, Vancouver, ISO, and other styles
12

Faheem, H. M. "Multiagent-based security for the wireless LAN." IEEE Potentials 24, no. 2 (April 2005): 19–22. http://dx.doi.org/10.1109/mp.2005.1462461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

She, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.

Full text
Abstract:
Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used to improve security status of endpoint. Applying Trusted Computing technology can solve these challenges and enhance WLAN security.
APA, Harvard, Vancouver, ISO, and other styles
14

Regan, Kevin. "Wireless LAN Security: Things You Should Know about WLAN Security." Network Security 2003, no. 1 (January 2003): 7–9. http://dx.doi.org/10.1016/s1353-4858(03)00110-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Badra, Mohamad, Pascal Urien, and Ibrahim Hajjeh. "Flexible and fast security solution for wireless LAN." Pervasive and Mobile Computing 3, no. 1 (January 2007): 1–14. http://dx.doi.org/10.1016/j.pmcj.2006.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

GHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (I). Types of Attacks." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 61–68. http://dx.doi.org/10.19107/ijisc.2013.02.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Cheng, Jiujun, Liufei Hu, Junjun Liu, Qingyang Zhang, and Chendan Yan. "A New Mechanism for Network Monitoring and Shielding in Wireless LAN." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/620926.

Full text
Abstract:
Wireless LAN (WLAN) technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.
APA, Harvard, Vancouver, ISO, and other styles
18

Atarashi, H., I. Yamaguchi, H. Watanabe, R. Yamamoto, K. Ohe, and K. Tanaka. "Wireless LAN Security Management with Location Detection Capability in Hospitals." Methods of Information in Medicine 51, no. 03 (2012): 221–28. http://dx.doi.org/10.3414/me10-01-0002.

Full text
Abstract:
SummaryObjectives: In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management.Methods: We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags.Results: The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk.Conclusions: We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.
APA, Harvard, Vancouver, ISO, and other styles
19

Choi, Young B., Jeffrey Muller, Christopher V. Kopek, and Jennifer M. Makarsky. "Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance." International Journal of Mobile Communications 4, no. 3 (2006): 266. http://dx.doi.org/10.1504/ijmc.2006.008942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Emilselvan, G. s. r., N. Gayathri, S. Rakesh Kumar, Ankush Rai, and Jagadeesh Kannan R. "ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 441. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19987.

Full text
Abstract:
Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.
APA, Harvard, Vancouver, ISO, and other styles
21

Xia, Wen Yu, Kai Jun Wu, and Liang Zhou. "The Security Analysis of WLAN Protocol Based on 802.11i." Applied Mechanics and Materials 513-517 (February 2014): 628–31. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.628.

Full text
Abstract:
This article briefly describes the weaknesses of WEP,which is previous generation wireless LAN security standard, then introduces the new generation of wireless network security standard 802.11i. Then the article introduces the process of TKIP and CCMP encryption. We use experiments to compare TKIP with CCMP about protocol security. Ultimately we conclude that CCMP encryption is safer.
APA, Harvard, Vancouver, ISO, and other styles
22

Koien, G. M., and T. Haslestad. "Integration of wireless LAN and 3G wireless - Security aspects of 3g-wlan interworking." IEEE Communications Magazine 41, no. 11 (November 2003): 82–88. http://dx.doi.org/10.1109/mcom.2003.1244927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Afsar Awan, Salman, and Amer Sohail. "EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS LAN IEEE 802.11N SECURITY MECHANISM." Journal of Global Innovations in Agricultural and Social Sciences 2, no. 2 (June 1, 2014): 97–101. http://dx.doi.org/10.17957/jgiass/2.2.550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Chang Quan. "A Security Authentication Scheme in Wireless LAN for Portable Terminal." Applied Mechanics and Materials 530-531 (February 2014): 637–40. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.637.

Full text
Abstract:
The portable terminal such as iPad, WIFI phone has limited computing power and transmission bandwidth compared with specialized computer, which is difficult to implement key cryptography algorithm with large amount of calculation question. This paper introduces a new EAP authentication method based on EAP-SAKE using hash function. Analysis result shows that the method can provide mutual authentication and key negotiation between peers,and can resist replay attack and man-in-middle attack.It has less communication load and computing amount, so it is more suitable for protecting the information security to portable mobile terminal which has limited resource in WLAN.
APA, Harvard, Vancouver, ISO, and other styles
25

You, Ilsun, Yoshiaki Hori, and Kouichi Sakurai. "Towards formal analysis of wireless LAN security with MIS protocol." International Journal of Ad Hoc and Ubiquitous Computing 7, no. 2 (2011): 112. http://dx.doi.org/10.1504/ijahuc.2011.038997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Suroto, Suroto. "WLAN Security: Threats And Countermeasures." JOIV : International Journal on Informatics Visualization 2, no. 4 (June 27, 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.

Full text
Abstract:
A wireless local area Network (WLAN) is being widely recognized as a viable cost effective general purpose solution in providing high speed real time access to information. With a WLAN, users can gain access to shared information without being bound to fixed plug-in-point. WLAN transmit and receive data over the air and thus collectively combine data connectivity with ease of mobility. WLAN provides wireless access to multi location enterprises, small and medium enterprises. It can replace wired LAN or simply be used as extension of wired infrastructure. Besides all these advantages WLAN are also facing major problems of security.So security is the aspect where most of the researchers are working. Following are the major objective of our study : i) To study the various Vulnerabilities and attacks on WLAN and their solutions. ii) To study the some of the exiting security methods used for securing WLAN and explore the possibility of improvements in the same. Our conclusion that WLAN security is not easy, and it is constantly changing. They expose the network to a new group of hackers. All businesses need to determine their security requirements based on the application using the WLAN. Goal so that a WLAN is as protected as Wired LAN.
APA, Harvard, Vancouver, ISO, and other styles
27

Permadi, Kukuh Bagas, Henki Bayu Seta, and Ria Astriratma. "Pengamanan Jaringan Wireless LAN Dengan Protokol EAP-TTLS Dan Otentikasi MSCHAPv2 Pada Fakultas Ilmu Komputer UPN Veteran Jakarta." Informatik : Jurnal Ilmu Komputer 16, no. 2 (August 31, 2020): 95. http://dx.doi.org/10.52958/iftk.v16i2.1970.

Full text
Abstract:
Penggunaan pada protokol WPA memiliki dua proses, antara lain adalah otentikasi serta enkripsi. Pada tingkat network dengan infrastuktur yang besar serta dengan lalu lintas network yang tinggi sama halnya dengan universitas, kantor perusahaan atau tempat umum lainnya yang menggunakan wireless LAN, proses otentikasi merupakan proses yang pertama kali yang dilakukan agar pengguna jaringan wireless LAN dapat mengakses jaringan internet. Maka dari itu, tidak hanya aman namun proses otentikasi bias beroperasi dengan cepat. Solusi dari penelitian ini adalah dengan menerapkan Protokol IEEE 802.1x EAP dengan Extensible Authentication Protocol – Tunneled Transport Layer Security (EAP-TTLS) untuk membuat secure tunnel (terowongan keamanan) dalam pertukaran kunci pada jaringan wireless, serta dengan inner authentication Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2). Luaran yang dihasilkan pada penelitian ini adalah membangun suatu keamanan pada jaringan wireless terpusat pada Fakultas Ilmu Komputer UPN Veteran Jakarta.
APA, Harvard, Vancouver, ISO, and other styles
28

Lu, Yong, Jingjing Liu, Lu Ning, and Yi Huang. "Exploration on SA Query Mechanism in IEEE 802.11w." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (January 2015): 13–26. http://dx.doi.org/10.4018/ijitn.2015010102.

Full text
Abstract:
Wireless communication has become increasingly popular due to development of internetworking. In this paper, the hidden security problems of IEEE802.11i in wireless LAN are presented. To solve them, the implementation of SA Query Mechanism of wireless devices is well-designed, based on Security Association (SA) Query mechanism proposed according to the IEEE 802.11w protocol. As to the reality, the implementation mentioned above is especially significant while plenty of wireless devices are lack of SA query mechanism, which is necessary in 802.11w protocol. In the last part, certain security risks of SA query mechanism are also discussed in this essay as supplementary.
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Il-Gu, Kyungmin Go, and Jung Hoon Lee. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices." Sensors 20, no. 7 (April 5, 2020): 2043. http://dx.doi.org/10.3390/s20072043.

Full text
Abstract:
Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Rajeev, and Teek Parval Sharma. "A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security." Wireless Personal Communications 77, no. 2 (December 20, 2013): 1145–65. http://dx.doi.org/10.1007/s11277-013-1559-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Fei, Yu Wang, and Yuan Tian. "Research of Improved Network Access Authorization Mechanism Based on Elliptic Curve." Applied Mechanics and Materials 519-520 (February 2014): 236–40. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.236.

Full text
Abstract:
Currently, the generic WLAN authentication protocols have the problem of low security intensity, or the problem of only one-way identification. It cannot completely adapt to the wireless LAN access certification requirements, under the condition of high security. The article analyzes the disadvantage of WAPI protocol, and then puts forward a kind of improved WLAN access authentication mechanism. It implements the mutual authentication, privacy protection, and also it can resist man-in-the-middle attack and impersonation attack. It fulfills the requirement of wireless terminals security access. The effect on security and efficiency is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.

Full text
Abstract:
Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.
APA, Harvard, Vancouver, ISO, and other styles
33

Kösem, Mehmet, and Ali Güneş. "Comparing Wireless LAN Standards and a Model Proposal for University Wireless Network Security with 802.1x." IARJSET 3, no. 4 (April 20, 2016): 13–17. http://dx.doi.org/10.17148/iarjset.2016.3403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Fischer, D., and B. Markscheffel. "The German Wireless LAN Security Survey 2009-How Security Measures are used in Companies and." International Journal for Infonomics 3, no. 2 (June 1, 2010): 278–84. http://dx.doi.org/10.20533/iji.1742.4712.2010.0030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kumar, Dr Vinod, Mr Avtar Singh, and Mrs Ritika Narang. "PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 2 (July 27, 2013): 80–84. http://dx.doi.org/10.24297/ijct.v5i2.3526.

Full text
Abstract:
Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium and lack of a centralized infrastructure. Security is an alarming concern, as everything being transmitted is available in the air. The current paper deals with Study of effect of rate on performance of cross layer based intrusion detection for WLAN reflects the significance of cross layer technique in detecting intruder on WLAN. Exploiting the information available across different layers of the protocol stack by triggering multiple levels of detection enhances the accuracy of detection. We validate our design through simulations and also demonstrate lower occurrence of false positives.
APA, Harvard, Vancouver, ISO, and other styles
36

Athawale, S. V. "Real-time Intrusion Prevention System to Increase Computer Security in Wireless LAN." International Journal for Research in Applied Science and Engineering Technology V, no. IX (September 30, 2017): 1428–32. http://dx.doi.org/10.22214/ijraset.2017.9206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Hayashi, Isao, Takashi Kobayashi, Yoshinori Arai, Toshiyuki Maeda, and Atsushi Inoue. "Optimal Location of Wireless LAN Access Points Using Fuzzy ID3." Journal of Advanced Computational Intelligence and Intelligent Informatics 13, no. 2 (March 20, 2009): 128–34. http://dx.doi.org/10.20965/jaciii.2009.p0128.

Full text
Abstract:
Although wireless LAN is useful in its small size and mobility, the connection region of transmitted radio wave is strongly affected by other electric devices, consumer products, and differences in size and type of the room. Besides, wireless LAN points (APs) must exclude a personal computers without permitting to connect to the Internet. Therefore, how optimally APs are located is important. In this paper, we propose the APs' optimal location method. The proposed algorithm integrates fuzzy rules acquired by fuzzy ID3 with knowledge of security experts, and estimates the connection region for AP. We discuss how to formulate the method for setting AP optimal location and show the effectiveness of this method by illustrating the examples of AP optimal locations.
APA, Harvard, Vancouver, ISO, and other styles
38

Oh, Hayoung. "Security-aware fair transmission scheme for 802.11 based cognitive IoT." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 2589. http://dx.doi.org/10.11591/ijece.v10i3.pp2589-2599.

Full text
Abstract:
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
APA, Harvard, Vancouver, ISO, and other styles
39

Park, Chang-Seop, Hyun-Sun Kang, and Jaijin Jung. "A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN." Mobile Information Systems 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/708064.

Full text
Abstract:
A new key management and security scheme is proposed to integrate Layer Two (L2) and Layer Three (L3) keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN). Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6) that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP) authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.
APA, Harvard, Vancouver, ISO, and other styles
40

Trimintzios, Panagiotis, and George Georgiou. "WiFi and WiMAX Secure Deployments." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–28. http://dx.doi.org/10.1155/2010/423281.

Full text
Abstract:
Wireless Broadband offers incredibly fast, “always on” Internet similar to ADSL and sets the user free from the fixed access areas. In order to achieve these features standardisation was achieved for Wireless LAN (WLANs) and Wireless Metropolitan Area Networks (WMANs) with the advent of IEEE802.11 and IEEE802.16 family of standards, respectively. One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. In this article, we present the security characteristics for the WiFi and the WiMAX networks. We thoroughly present the security mechanisms along with a threat analysis for both IEEE 802.11 and the 802.16 as well as their amendments. We summarise in a comparative manner the security characteristics and the possible residual threats for both standards. Finally focus on the necessary actions and configurations that are needed in order to deploy WiFi and WiMAX with increased levels of security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
41

Nam, Ji-Hyun, Ju-yeop Lee, Song-hui Kwon, and Hyoung-Kee Choi. "Comparative Analysis on Security Protocols of WPA3 Standard for Secure Wireless LAN Environments." Journal of Korean Institute of Communications and Information Sciences 44, no. 10 (October 31, 2019): 1878–87. http://dx.doi.org/10.7840/kics.2019.44.10.1878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ding, Ai Xia, and Wang Dan. "The Security Experience of Wireless Local Area Network at Ningbo University." Advanced Materials Research 488-489 (March 2012): 1603–8. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1603.

Full text
Abstract:
The network revolution has dramatically changed the way individuals communicate and conduct business. In the whole network system, WLAN is the most easily linked to the users. The diversity of WLAN communication makes it faced with various information security threats. This paper provides necessary and sufficient conditions for wireless network to lead to an increased security level. Concerns for WLAN security and confidentiality in a university environment were expressed in the paper. A number of recommendations are provided to initiate and promote WLAN security. The contribution of this paper is divided into three parts. Firstly, it introduces the overall network and the WLAN of Ningbo University in general. Secondly, it analyzes different WLAN protocol defects and the information security threats and attacks known in the campus LAN. Thirdly, it provides WLAN communication security precautions and the strategies adopted by our university for solution from the aspects of technique and management respectively.
APA, Harvard, Vancouver, ISO, and other styles
43

Wibawa, Sigit. "SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW." TEKNOKOM 4, no. 2 (July 9, 2021): 43–47. http://dx.doi.org/10.31943/teknokom.v4i2.60.

Full text
Abstract:
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
APA, Harvard, Vancouver, ISO, and other styles
44

PETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.

Full text
Abstract:
Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.
APA, Harvard, Vancouver, ISO, and other styles
45

Hwang, Seong-Kyu, and Seung-Jo Han. "A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 837–46. http://dx.doi.org/10.6109/jkiice.2013.17.4.837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

CHUNG, B. "A Novel (Re)Association Control Scheme for Inter-AP Security Transition in Mobile Wireless LAN." IEICE Transactions on Communications E89-B, no. 5 (May 1, 2006): 1613–19. http://dx.doi.org/10.1093/ietcom/e89-b.5.1613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Qing Fu, Jian Wu Yang, and Zhi Cheng Chen. "The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01." Advanced Materials Research 271-273 (July 2011): 991–94. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.991.

Full text
Abstract:
With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
48

., Haeruddin. "Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 4, no. 1 (July 20, 2020): 119–27. http://dx.doi.org/10.31289/jite.v4i1.3832.

Full text
Abstract:
The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security.Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.
APA, Harvard, Vancouver, ISO, and other styles
49

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector routing. We adopt On Demand Distance Vector routing solely based on source routing and “On Demand” process, so each packet does not have to transmit any periodic routing information. We implemented intrusion detection system with five different nodes and the performance parameters like packet delivery ratio, throughput, delay are computed with attacker and without attacker and on demand distance vector routing protocols is proposed to implement in hardware using Zigbee</p>
APA, Harvard, Vancouver, ISO, and other styles
50

P, Senthilkumar, and Baskar M. "A study on mobile ad-hock networks (manets)." Journal of Management and Science 1, no. 1 (June 30, 2011): 14–20. http://dx.doi.org/10.26524/jms.2011.3.

Full text
Abstract:
As we know that wireless technology becomes very famous among all the aspects of different technologies of computer networking of present era, the Wireless networks really provide the convenient and easy approach to communications between different areas. Wi-Fi is commonly called as wireless LAN, it is one of those networks in which high frequency radio waves are required for transmission of data from one place to another. Wi-Fi operates on several hundred feet between two places of data transmission. This technology only works on high frequency radio signals. Nowadays this technology is used as office or home network and in many electronic devices. Wireless LAN or Wi-Fi is divided into three main parts on which its whole working depends and all of its applicationsdepend on these parts such as infrastructure mode and ad hoc mode of networking. However, the important type that plays a vital role almost in application is the Ad Hoc mode of networking.This type of networking is also commonly called as peer-to-peer networking or P2P networking. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. There is still ongoing research on mobile ad hoc networks and the research may leadto even better protocols and will probably face new challenges. The current goal is to find an optimal balance between scalable routing and media access control, security, and service management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography